Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Английский язык - II семестр.docx
Скачиваний:
17
Добавлен:
28.04.2019
Размер:
2.69 Mб
Скачать

2. Comprehension check

2.1. Match the terms with their definitions.

1. malware a) it perpetrates identity theft in order to access a computer user's online accounts.

2. crimeware b) it facilitates unauthorized access to the user's computer system.

3. trojan horse c) can copy itself and infect a computer without the permission or knowledge of the owner.

4. spyware d) it collects information about users, their computer or browsing habits without their informed consent.

5. worm e) it infiltrates or damages a computer system without the owner's informed consent.

6. computer virus f) it facilitates unauthorized access to the user's computer system.

2.2. Match the sentence beginnings (1-6) with the correct endings (a-f).

1. Crimeware is designed to perpetrate identity theft in order………

2. Spyware is known to change computer settings, resulting in…….

3. Trojan horses are not self-replicating that distinguishes them…...

4. …………….a worm does not need to attach itself to an existing program.

5. Viruses can increase their chances of spreading to other computers by infecting files on a network file system.

6. Internet security involves the protection of a computer's internet account and files from….

a) intrusion of an unknown user.

b) to access a computer user's online accounts.

c) unlike a virus

d) slow connection speeds, different home pages, and loss functionality of other programs.

e) from viruses and worms.

2.3. Look at the text again and answer the questions.

- When is a computer taking a risk?

- What does Internet security involve?

- What does basic security measures involve?

- What is a malware?

- When is the term ‘computer virus’ used?

- What can computer viruses do?

- What is the difference between computer viruses and worms?

- What distinguishes Trojan horses from worms and viruses?

- Where is a spyware installed?

- What is a crimeware designed for?

3. Language work

Help box

Past Forms

Past Simple

Past Continuous

Past Perfect

Past Perfect Continuous

past actions which happened one after the other

She sealed the letter, put a stamp on it and posted it.

action in the middle of happening at stated past time.

He was playing tennis at 4.30 yesterday.

past action which occurred before another action or before a stated past time

He had left by the time I got there.

action continuing over a period up to a specific time in the past

She had been working as a clerk for 10 years before she resigned.

complete action or event which happened at a stated past tim.

She called an hour ago.

past action in progress interrupted by another past action

While I was getting dressed the bell rang.

complete past action which had visible results in the past

She was sad because she had failed the test.

past action of certain duration which had visible results in the past

They were wet because they had been working in the rain.

action which happened at a definite past time although the time is not mentioned

Shakespeare wrote a lot of plays.

two or more simultaneous past actions

While I was sunbathing, he was swimming.

the Past Perfect is the past equivalent of the Present Perfect

He couldn’t find his watch. He had lost it.

the Past Perfect Continuous is the past equivalent of the Present Perfect Continuous

She went to the doctor. Her lag had been aching for two days.